Cybersecurity Analyst – Operations Watch Analyst (Tier 1–3) jobs in United States
cer-icon
Apply on Employer Site
company-logo

Sentar Inc. · 2 months ago

Cybersecurity Analyst – Operations Watch Analyst (Tier 1–3)

Sentar Inc. is an employee-owned company dedicated to developing critical talent in cybersecurity, intelligence, analytics, and systems engineering. The Cybersecurity Analyst – Operations Watch Analyst will identify, investigate, report, and mitigate cyber incidents, ensuring timely detection and response to security events across network environments.

AnalyticsCyber SecurityInformation ServicesInformation TechnologyIntelligent Systems
check
Growth Opportunities
badNo H1BnoteSecurity Clearance RequirednoteU.S. Citizen Onlynote

Responsibilities

Maintain a thorough working knowledge of CJCSM 6510.01B and ensure compliance with related policies and procedures
Develop, maintain, and continuously improve Standard Operating Procedures (SOPs) for operational watch functions
Conduct proactive network intrusion detection, monitoring, correlation, and analysis to identify potential threats
Validate and assess suspicious events to determine if they meet incident criteria, ensuring accurate and timely entry into designated reporting systems
Coordinate with Joint Force Headquarters-DoDIN (JFHQ-DoDIN) and supported organizations to ensure appropriate analysis, reporting, and escalation of significant incidents
Provide 24/7 incident response coverage, including after-hours and surge support as mission needs dictate
Perform network and host-based digital forensics across Microsoft Windows and other operating systems to support incident analysis and remediation
Analyze full packet captures (PCAP) using tools such as Wireshark and other network forensic utilities
Correlate system and network activity using Splunk and other log aggregation tools to detect anomalies and potential intrusions
Develop, tune, and implement Intrusion Detection/Prevention System (IDS/IPS) signatures to enhance detection accuracy and minimize false positives
Participate in program reviews, product assessments, and on-site certification evaluations to strengthen cyber defense posture
Support a rotating shift schedule (4x10-hour workdays), including at least one weekend day
Work collaboratively in a high-tempo, mission-focused environment requiring flexibility and occasional overtime for surge operations

Qualification

Cybersecurity incident responsePacket analysisIntrusion Detection/Prevention SystemsDigital forensicsSplunkCJCSM 6510.01B complianceLog correlationCommunication skillsCritical thinkingTeam collaboration

Required

Secret with upgrade to TS required
Bachelor's degree in Cybersecurity, Information Technology, or a related field; or a minimum of three years of directly relevant experience, preferably within a DoD or federal cybersecurity environment
Willingness to travel up to 15% globally, including short-notice (72-hour) deployments in support of incident response operations
Must hold an IAT Level II (Tier 1 and 2) or IAT Level III (Tier 3) certification (per DoD 8570.01-M) and PWS certification requirements in accordance with DoD cybersecurity workforce requirements
Maintain a thorough working knowledge of CJCSM 6510.01B and ensure compliance with related policies and procedures
Develop, maintain, and continuously improve Standard Operating Procedures (SOPs) for operational watch functions
Conduct proactive network intrusion detection, monitoring, correlation, and analysis to identify potential threats
Validate and assess suspicious events to determine if they meet incident criteria, ensuring accurate and timely entry into designated reporting systems
Coordinate with Joint Force Headquarters-DoDIN (JFHQ-DoDIN) and supported organizations to ensure appropriate analysis, reporting, and escalation of significant incidents
Provide 24/7 incident response coverage, including after-hours and surge support as mission needs dictate
Perform network and host-based digital forensics across Microsoft Windows and other operating systems to support incident analysis and remediation
Analyze full packet captures (PCAP) using tools such as Wireshark and other network forensic utilities
Correlate system and network activity using Splunk and other log aggregation tools to detect anomalies and potential intrusions
Develop, tune, and implement Intrusion Detection/Prevention System (IDS/IPS) signatures to enhance detection accuracy and minimize false positives
Participate in program reviews, product assessments, and on-site certification evaluations to strengthen cyber defense posture
Support a rotating shift schedule (4x10-hour workdays), including at least one weekend day
Work collaboratively in a high-tempo, mission-focused environment requiring flexibility and occasional overtime for surge operations

Preferred

Five or more years of cybersecurity incident response experience
Strong knowledge of incident response procedures, packet analysis, IDS/IPS technologies, and host-based security tools
Proficiency in log correlation and analysis using tools such as Splunk, Elastic, or equivalent platforms
Familiarity with digital forensics tools and methodologies
Demonstrated ability to analyze complex issues, think critically, and operate independently under pressure
Excellent written and verbal communication skills to support operational reporting and coordination
In-depth understanding of CJCSM 6510.01B reporting requirements
Prior experience in DoD environments
Experience conducting digital forensics and malware analysis

Benefits

Voluntary Medical, Dental, Vision, with Health Savings or Flexible Spending Plan options
Voluntary Life, Critical Illness, Accident, and Long Term Care insurance options
Group Term Life, Short-Term and Long-Term Disability is provided by Sentar to all qualifying employees
Generous 401(k) match
Competitive PTO plan that graduates quickly with years of service
Other leave programs; holiday schedule along with bereavement, maternity, jury and military duty
Mental health awareness programs
Tuition reimbursement
Professional development reimbursement
Recognition and Awards programs

Company

Sentar Inc.

twittertwitter
company-logo
Sentar, an employee-owned company, is a leading cyber-intelligence solutions provider focused on the National Security sector.

Funding

Current Stage
Growth Stage
Total Funding
unknown
Key Investors
US Department of Energy
2023-08-17Grant
2021-03-11Acquired

Leadership Team

leader-logo
Peter Kiss
CVO/Visionary
linkedin
leader-logo
Stephen Pratt
Chief Information Security Officer (CISO) / Director of Programs, Cyber Risk & Compliance Sector
linkedin
Company data provided by crunchbase